相关参考文献
注意:仅列出部分参考文献,下载原文获取全部文献信息。Faster Authenticated Key Agreement With Perfect Forward Secrecy for Industrial Internet-of-Things
Zheng Yang et al.
IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS (2020)
Detection of Node Capture Attack in Wireless Sensor Networks
Sarita Agrawal et al.
IEEE SYSTEMS JOURNAL (2019)
Secure Biometric-Based Authentication Scheme Using Chebyshev Chaotic Map for Multi-Server Environment
Santanu Chatterjee et al.
IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING (2018)
Chaotic Map-Based Anonymous User Authentication Scheme With User Biometrics and Fuzzy Extractor for Crowdsourcing Internet of Things
Sandip Roy et al.
IEEE INTERNET OF THINGS JOURNAL (2018)
A Provably Secure Three-Factor Session Initiation Protocol for Multimedia Big Data Communications
S. K. Hafizul Islam et al.
IEEE INTERNET OF THINGS JOURNAL (2018)
A secure chaotic map-based remote authentication scheme for telecare medicine information systems
Xiong Li et al.
FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE (2018)
On the Challenges in Designing Identity-Based Privacy-Preserving Authentication Schemes for Mobile Devices
Ding Wang et al.
IEEE SYSTEMS JOURNAL (2018)
Measuring Two-Factor Authentication Schemes for Real-Time Data Access in Industrial Wireless Sensor Networks
Ding Wang et al.
IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS (2018)
Lightweight and Practical Anonymous Authentication Protocol for RFID Systems Using Physically Unclonable Functions
Prosanta Gope et al.
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY (2018)
Comments on An improved secure and efficient password and chaos-based two-party key agreement protocol
Chien-Ming Chen et al.
NONLINEAR DYNAMICS (2017)
Security Analysis of Password-Authenticated Key Retrieval
SeongHan Shin et al.
IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING (2017)
Secure Three-Factor User Authentication Scheme for Renewable-Energy-Based Smart Grid Environment
Mohammad Wazid et al.
IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS (2017)
Zipf's Law in Passwords
Ding Wang et al.
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY (2017)
Enhanced smartcard-based password-authenticated key agreement using extended chaotic maps
Tian-Fu Lee et al.
PLOS ONE (2017)
A New Efficient Chaotic Maps Based Three Factor User Authentication and Key Agreement Scheme
Lidong Han et al.
WIRELESS PERSONAL COMMUNICATIONS (2017)
An improved secure and efficient password and chaos-based two-party key agreement protocol
Yu Liu et al.
NONLINEAR DYNAMICS (2016)
Robust extended chaotic maps-based three-factor authentication scheme preserving biometric template privacy
Qi Jiang et al.
NONLINEAR DYNAMICS (2016)
Targeted Online Password Guessing: An Underestimated Threat
Ding Wang et al.
CCS'16: PROCEEDINGS OF THE 2016 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY (2016)
On the Implications of Zipf's Law in Passwords
Ding Wang et al.
COMPUTER SECURITY - ESORICS 2016, PT I (2016)
Improved chaotic maps-based password-authenticated key agreement using smart cards
Han-Yu Lin
COMMUNICATIONS IN NONLINEAR SCIENCE AND NUMERICAL SIMULATION (2015)
Robust Biometrics-Based Authentication Scheme for Multiserver Environment
Debiao He et al.
IEEE SYSTEMS JOURNAL (2015)
Anonymous Two-Factor Authentication in Distributed Systems: Certain Goals Are Beyond Attainment
Ding Wang et al.
IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING (2015)
Preserving privacy for free: Efficient and provably secure two-factor authentication scheme with user anonymity
Ding Wang et al.
INFORMATION SCIENCES (2015)
Enhancing the security of password authenticated key agreement protocols based on chaotic maps
Tian-Fu Lee
INFORMATION SCIENCES (2015)
A provable authenticated key agreement protocol with privacy protection using smart card based on chaotic maps
Hongfeng Zhu et al.
NONLINEAR DYNAMICS (2015)
On the anonymity of two-factor authentication schemes for wireless sensor networks: Attacks, principle and solutions
Ding Wang et al.
COMPUTER NETWORKS (2014)
Security flaws in two improved remote user authentication schemes using smart cards
Chun-Guang Ma et al.
INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS (2014)
Provably secure dynamic identity-based three-factor password authentication scheme using extended chaotic maps
S. K. Hafizul Islam
NONLINEAR DYNAMICS (2014)
Chaotic maps-based password-authenticated key agreement using smart cards
Cheng Guo et al.
COMMUNICATIONS IN NONLINEAR SCIENCE AND NUMERICAL SIMULATION (2013)
Novel Anonymous Authentication Scheme Using Smart Cards
Jia-Lun Tsai et al.
IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS (2013)
Dynamic ID-based remote user password authentication schemes using smart cards: A review
R. Madhusudhan et al.
JOURNAL OF NETWORK AND COMPUTER APPLICATIONS (2012)
Secure group key agreement protocol based on chaotic Hash
Xianfeng Guo et al.
INFORMATION SCIENCES (2010)
Two-Factor User Authentication in Wireless Sensor Networks
Manik Lal Das
IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS (2009)
Cryptanalysis of the public key encryption based on multiple chaotic systems
Linhua Zhang
CHAOS SOLITONS & FRACTALS (2008)
Two-factor mutual authentication based on smart cards and passwords
Guomin Yang et al.
JOURNAL OF COMPUTER AND SYSTEM SCIENCES (2008)
A novel key agreement protocol based on chaotic maps
Di Xiao et al.
INFORMATION SCIENCES (2007)
Security problems with a chaos-based deniable authentication scheme
G Alvarez
CHAOS SOLITONS & FRACTALS (2005)
Security of public-key cryptosystems based on Chebyshev polynomials
P Bergamo et al.
IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS I-REGULAR PAPERS (2005)
An efficient entire chaos-based scheme for deniable authentication
D Xiao et al.
CHAOS SOLITONS & FRACTALS (2005)
A dynamic ID-based remote user authentication scheme
ML Das et al.
IEEE TRANSACTIONS ON CONSUMER ELECTRONICS (2004)
Examining smart-card security under the threat of power analysis attacks
TS Messerges et al.
IEEE TRANSACTIONS ON COMPUTERS (2002)